{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T21:29:05.073","vulnerabilities":[{"cve":{"id":"CVE-2022-38096","sourceIdentifier":"security@openanolis.org","published":"2022-09-09T15:15:14.407","lastModified":"2024-11-21T07:15:47.077","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS)."},{"lang":"es","value":"Se ha encontrado una vulnerabilidad de desreferencia de puntero NULL en el controlador vmwgfx en el archivo drivers/gpu/vmxgfx/vmxgfx_execbuf.c en el componente GPU del kernel de Linux con el archivo de dispositivo \"/dev/dri/renderD128 (o Dxxx)\". Este fallo permite a un atacante local con una cuenta de usuario en el sistema conseguir privilegios, causando una denegación de servicio (DoS)"}],"metrics":{"cvssMetricV31":[{"source":"security@openanolis.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}]},"weaknesses":[{"source":"security@openanolis.org","type":"Secondary","description":[{"lang":"en","value":"CWE-476"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20","matchCriteriaId":"BFF66E81-5620-41E9-832D-BD820B585A70"}]}]}],"references":[{"url":"https://bugzilla.openanolis.cn/show_bug.cgi?id=2073","source":"security@openanolis.org","tags":["Issue Tracking","Permissions Required"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","source":"security@openanolis.org"},{"url":"https://bugzilla.openanolis.cn/show_bug.cgi?id=2073","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Permissions Required"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}